Back to bug 2085393

Who When What Removed Added
TEJ RATHI 2022-05-13 09:02:38 UTC CC michal.skrivanek, mperina, sbonazzo
TEJ RATHI 2022-05-13 09:03:57 UTC Blocks 2085396
TEJ RATHI 2022-05-17 06:09:21 UTC Depends On 2087006
TEJ RATHI 2022-05-17 06:11:11 UTC Depends On 2087008
FrantiĊĦek Hrdina 2022-05-17 06:38:52 UTC CC fhrdina
TEJ RATHI 2022-05-18 04:25:19 UTC Doc Text A NULL Pointer Dereference flaw was found in vims' vim_regexec_string() function in regexp.c file. This flaw occurs when the function tries to match buffer with invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL Pointer Dereference that causes an application to crash leading to a denial of service.
TEJ RATHI 2022-05-18 04:29:38 UTC Doc Text A NULL Pointer Dereference flaw was found in vims' vim_regexec_string() function in regexp.c file. This flaw occurs when the function tries to match buffer with invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL Pointer Dereference that causes an application to crash leading to a denial of service. A NULL Pointer Dereference flaw was found in vim's vim_regexec_string() function in regexp.c file. This flaw occurs when the function tries to match buffer with invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL Pointer Dereference that causes an application to crash leading to a denial of service.
RaTasha Tillery-Smith 2022-05-18 12:19:50 UTC Doc Text A NULL Pointer Dereference flaw was found in vim's vim_regexec_string() function in regexp.c file. This flaw occurs when the function tries to match buffer with invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL Pointer Dereference that causes an application to crash leading to a denial of service. A NULL pointer dereference flaw was found in vim's vim_regexec_string() function in regexp.c file. The issue occurs when the function tries to match the buffer with an invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL pointer dereference that causes an application to crash, leading to a denial of service.
Sandro Bonazzola 2022-11-18 15:45:05 UTC CC sbonazzo
Red Hat Bugzilla 2023-07-07 08:34:59 UTC Assignee security-response-team nobody

Back to bug 2085393